03760nam 2200685Ia 450 991097159480332120251117082433.01-282-68350-097866126835030-470-64286-6(CKB)2550000000013627(EBL)516952(OCoLC)635955021(SSID)ssj0000404185(PQKBManifestationID)11278728(PQKBTitleCode)TC0000404185(PQKBWorkID)10341131(PQKB)10763189(MiAaPQ)EBC516952(CaSebORM)9780470525203(Au-PeEL)EBL516952(CaPaEBR)ebr10383604(CaONFJC)MIL268350(OCoLC)646133940(OCoLC)ocn646133940 (EXLCZ)99255000000001362720100202d2010 uy 0engur|n|---|||||txtccrCEH certified ethical hacker study guide /Kimberly Graves1st ed.Indianapolis, IN Wiley20101 online resource (439 p.)Description based upon print version of record.0-470-52520-7 Includes bibliographical references and index.CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and WormsChapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; GlossaryIndexFull Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denialElectronic data processing personnelCertificationComputer securityExaminationsStudy guidesHackersExaminationsStudy guidesComputer networksExaminationsStudy guidesElectronic data processing personnelCertification.Computer securityExaminationsHackersExaminationsComputer networksExaminations005.8Graves Kimberly1974-1856678MiAaPQMiAaPQMiAaPQBOOK9910971594803321CEH4456362UNINA